• Title/Summary/Keyword: 라우팅시스템

Search Result 483, Processing Time 0.03 seconds

Implementation of Flooding Routing Protocol for Field sever using Weather Monitoring System (국지기상 모니터링용 필드서버를 위한 플러딩 라우팅 프로토콜의 구현)

  • Yoo, Jae-Ho;Lee, Seung-Chul;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.233-240
    • /
    • 2011
  • A field server was developed by using ubiquitous sensor network technology to monitor the abrupt weather variation in local or mountain area. The data transmissions between deployed field servers in local terrain are very important technology in disaster prevention monitoring system. Weather related information such as temperature, humidity, illumination, atmospheric pressure, dew point and meteorological data are collected from the designated field at a regular interval. The received information from the multiple sensors located at the sensor field is used flooding routing protocol transmission techniques and the sensing data is transferred to gateway through multi-hop method. Telosb sensor node are programmed by nesC language in TinyOS platform to monitor the weather parameters of the local terrain.

Mesh Network Implementation using DWDS-based Link Layer Routing (DWDS 기반의 링크 계층 라우팅을 통한 메쉬 네트워크 구현)

  • Yoon, Mi-Kyung;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2A
    • /
    • pp.165-173
    • /
    • 2010
  • WMN(Wireless Mesh Network) is an wireless backbone network technology that is an easily configurable network in the low cost compared to the wireless LAN(Local Area Network). Most of the previous researches have evaluated their algorithms by the simulations rather than by the implementation. There exist some implementation papers, however, they have the limitations of the flexibility on the link establishment and the link quality utilization. Consequently, the benefit of the WMN - configuration flexibility is degraded and the performance deterioration occurs in the multi-hop wireless environment. In this paper, we introduce a Linux-based link layer Wireless Mesh Routing System - WBMR. The design and implementation of WBMR provides the dynamic link establishment and the effective multi-channel usage. We have modified the ntroof the original WLAN operation for the dynamic link establishment, and the Linux bridge for the link layer routing. The result of performance evaluation verifies that our WBMR supports fast self-configuration and increases data transmission throughput compared to the other researches of the wireless multi-hop environment.

An Efficient MPLS Routing System for Supporting QoS and Best-Effort Services (QoS 서비스와 최선형 서비스를 위한 효율적인 MPLS 라우팅 시스템)

  • Jeon, Hahn-Earl;Kim, Sung-Dae;Shin, Yong-Chul;Lee, Jai-Yong;Kim, Hyung-Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.71-79
    • /
    • 2003
  • As the traffic grows rapidly in the Internet, the QoS guarantee of the flows and the traffic engineering problems have become very important issues. MPLS has more advantages to solve the problems than existing IP routing because of its use of multiple paths between the source and destination pairs Particularly, the availability of Constraint-based Shortest Path First(CSPF) algorithm and explicit route in MPLS made the problem referred above to be solved efficiently. However, the CSPF algorithm has the characteristic of selecting the shortest path of all paths which meet the traffics' QoS constraints Therefore, even though there are alternative paths to route traffic, alternate QoS paths may not be found and best-effort traffic will be dropped during congestion period In this paper, we present the network resource optimization method related to the traffic engineering by using load balancing through routing in MPLS network.

A Study on Heuristic Approaches for Routing and Wavelength Assignment in WDM All-Optical Networks (WDM 전광망에서 라우팅과 파장할당을 위한 휴리스틱 방법에 대한 연구)

  • Kim, Ki-Won;Chung, Young-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.8
    • /
    • pp.19-29
    • /
    • 2001
  • The recent explosion in the Internet applications, Internet. host number and the traffic in the IP backbone network is posing new challenges for transport network. This requires a high-speed IP backbone network that has a substantially higher bandwidth than the one offered by current networks, which prompts the development of all-optical network. To obtain optical network utilization gains, we need a software which establishs logical topology to make possible the efficient use or physical topology, and control the optical network in combination with the IP layer routing protocols. Finally, the logical topology is required higher efficient than physical topology. For this an efficient algorithm for the routing and wavelength assignment(RWA) in the WDM all-optical network is necessary. In this paper, two kinds of heuristic algorithms to establish logical topology for WDM networks and arc applied to the design of logical topology of domestic backbone network. These algorithms are found to work quite well and they arc compared with each other in terms of blocking rate, etc.

  • PDF

A Hierarchical Underwater Acoustic Sensor Network Architecture Utilizing AUVs' Optimal Trajectory Movements (수중 무인기의 최적 궤도 이동을 활용하는 계층적 수중 음향 센서 네트워크 구조)

  • Nguyen, Thi Tham;Yoon, Seokhoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1328-1336
    • /
    • 2012
  • Compared to terrestrial RF communications, underwater acoustic communications have several limitations such as limited bandwidth, high level of fading effects, and a large underwater propagation delay. In this paper, in order to tackle those limitations of underwater communications and to make it possible to form a large underwater monitoring systems, we propose a hierarchical underwater network architecture, which consists of underwater sensors, clusterheads, underwater/surface sink nodes, autonomous underwater vehicles (AUVs). In the proposed architecture, for the maximization of packet delivery ratio and the minimization of underwater sensor's energy consumption, a hybrid routing protocol is used. More specifically, cluster members use Tree based routing to transmit sensing data to clusterheads. AUVs on optimal trajectory movements collect the aggregated data from clusterhead and finally forward the data to the sink node. Also, in order to minimize the maximum travel distance of AUVs, an Integer Linear Programming based algorithm is employed. Performance analysis through simulations shows that the proposed architecture can achieve a higher data delivery ratio and lower energy consumption than existing routing schemes such as gradient based routing and geographical forwarding. Start after striking space key 2 times.

A New Deadlock Detection Mechanism in Wormhole Networks (웜홀 네트웍을 위한 새로운 교착상태 발견 기법)

  • Lee, Su-Jung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.280-289
    • /
    • 2003
  • Deadlock recovery-based routing algorithms in wormhole networks have gained attraction due to low hardware complexity and high routing adaptability Progressive deadlock recovery techniques require a few dedicated resources to transmit deadlocked packets rather than killing them. Selection of deadlocked packets is primarily based on time-out value which should be carefully determined considering various traffic patterns or packet length. By its nature, current techniques using time-out accompany unignorable number of false deadlock detections especially in a heavy-loaded network or with long packet size. Moreover, when a deadlock occurs, more than one packet may be marked as deadlocked, which saturate the resources allocated for recovery. This paper proposes more accurate deadlock detection scheme which does not make use of time-out to declare deadlock. The proposed scheme reduces the probability to detect false deadlocks considerably. Furthermore, a single message is selected as deadlocked for each cycle of blocked messages, thereby eliminating recovery overheads.

Using Genetic Algorithms in Wireless Mesh Network Routing Protocol Design (유전 알고리즘을 이용한 무선 메쉬 네트워크에서의 라우팅 프로토콜 설계)

  • Yoon, Chang-Pyo;Ryou, Hwang-Bin
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.179-186
    • /
    • 2011
  • Wireless Mesh Network technology refers to the technology which establishes wireless network whose transmission speed is similar to that of the wire system, and provides more enhanced flexibility in the building of network, compared to the existing wired network. In addition, it has the feature of less mobility and less restriction from the energy effect. However, there follow many considerations such as system overhead in the case of setting or the selection of multi-path. Accordingly, the focus is on the design and optimization of network which can reflect this network feature and the technology to establish path. This paper suggests the methods on the programming of path in Wireless Mesh Network routing by applying the evaluation value of node service, making use of the loss rate of data, the hop count of bandwidth and link and the traffic status of node, considering the performance of link and load in the fitness evaluation function, in order to respond to the programming of multi-path effectively.

Design and Implementation of eduroam Authentication-Delegation System (eduroam 사용자 대리인증 시스템의 설계 및 구현)

  • Lee, KyoungMin;Jo, Jinyong;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.9
    • /
    • pp.1730-1740
    • /
    • 2016
  • This paper introduces a guest identity provider system for eduroam which is a global Wi-Fi service targeting users enrolled in higher education and research institutions. Developed eduroam AND (AutheNtication Delegation) system enables users to create their eduroam user accounts and to access eduroam regardless of their locations. Users with no organizational eduroam account therefore can freely access eduroam using the system. A federated authentication model is implemented in the system, and thus the system has merits of having high accessibility, indirectly verifying users and organizations possible, saving management overhead. Status monitoring is essential because authentication request and response messages are routed by eduroam network. eduroam AND performs active monitoring to check service availability and visualizes the results, which increases operational and management efficiency. We leveraged open-source libraries to implement eduroam AND and run the system on KREONET (Korea REsearch Open NETwork). Lastly, we present implementation details and qualitively evaluate the system.

NetFlow based IPv6 user's Flow traffic monitoring (NetFlow 기반 IPv6 사용자 Flow traffic 모니터링)

  • Kim, Sung-Su;Song, Wang-Cheol;Oh, Yong-Taek;Choi, Deok-Jai
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.42-46
    • /
    • 2006
  • As the next generation internet (NGI) is supporting High-speed in Gbps rate with the appearance of advanced network technologies, various applications that require high data rates. have been experimented and operated. By using high speed application services, many kinds of problems can be generated but we cannot easily grasp their reasons. However, if the user monitors the end-to-end one's flow data information (path and data rate in each router, state of each router) he can find them more accurately Until now, we have found out the fact that systems which can network-widely monitor end-to-end flow have not be developed yet, only simple systems which can monitor user's individual flow data at just one node are developed In this study, we suggest and materialize a system which can analyze bandwidth in real time by searching routing paths and measuring packet transfer rate between end-to-end flow data and supported flow traffic of using IPv6.

  • PDF

Investigation of Secure Wireless Multihop Ad hoc Network (안전한 무선 Multihop Ad hoc 네트워크를 위한 연구)

  • Lee, Sang-Duck;Park, Jong-An;Han, Seung-Jo;Pyun, Jae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.118-126
    • /
    • 2007
  • An ad hoc network is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to internetwork without any preexisting communication infrastructure. Although ad hoc network is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; ad hoc networks are known to be particularly vulnerable to security attack. It is difficult to establish a centralized key distribution center and a trusted certification authority to provide cryptographic keys and digital certificates to nodes. To prevent attacks in ad hoc routing protocols, many algorithms have been used. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is comprehensive solution for secure data forwarding in wireless multihop networks. With the simulation results, the proposed scheme is compared with existing source routing scheme.

  • PDF